Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56853D7B.2030009@openwall.net>
Date: Thu, 31 Dec 2015 08:36:43 -0600
From: jfoug <jfoug@...nwall.net>
To: john-users@...ts.openwall.com, ls@...r.so
Subject: Re: QNX Neutrino 6.6.0 password hashes

A new test was performed, using just a 1 byte password and 16 byte 
salt.  It appears that hashes (salt+passwords) up to 114 bytes 'work', 
but after that, they are broken (but consistently broken) for sha512.  
It may be that the buffer cleaning is not being properly done (the final 
'bit length' buffer).  Hopefully this can be figured out, and 
replicated, so that sha512 can also be cracked by jtr.  It is especially 
important, since sha512 is the 'default'

https://moar.so/tmp/qnx_sha512_broken_2.txt

On 12/30/2015 7:24 PM, jfoug wrote:
> Hmm, it looks to me like QNX sha512 is broken. Look at this newer page
>
> https://moar.so/tmp/qnx_sha512_broken.txt

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.